Syndicated Blog

Mend
AppSec, DevSecOps, open source license compliance, and audits: we’ve got you covered

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise

|
The Mend.io research team detected more than 100 malicious packages targeting the most popular machine learning (ML) libraries from the PyPi registry. The post Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables ...

Over 100 Malicious Packages Target Popular ML PyPi Libraries

|
The Mend.io research team detected more than 100 malicious packages targeting the most popular machine learning (ML) libraries from the PyPi registry. The post Over 100 Malicious Packages Target Popular ML PyPi ...

Container Security: Creating an Effective Security Program with Reachability Analysis

|
Read our guide on creating an effective container security program with reachability analysis. The post Container Security: Creating an Effective Security Program with Reachability Analysis appeared first on Mend ...

Mend.io Launches Mend Container

|
Mend Container finds runtime threats and secrets, scans Kubernetes clusters for in-use containers, and provides full coverage from development to deployment. The post Mend.io Launches Mend Container appeared first on Mend ...

Breaking: What is Going on with the NVD? Does it Affect Me?

|
The NVD has a large backlog of unanalyzed vulnerabilities. See if you're impacted. The post Breaking: What is Going on with the NVD? Does it Affect Me? appeared first on Mend ...

Mend.io Launches Mend AI

|
Announcing the launch of our new tool, Mend AI to identify, track, and secure AI and AI-generated code. The post Mend.io Launches Mend AI appeared first on Mend ...

What is the difference between an SCA scan and a container scan?

|
Can you scan your containers with any old SCA and still get good results? The post What is the difference between an SCA scan and a container scan? appeared first on Mend ...

How is a Container Scan Done?

|
Learn the importance of scanning container images for vulnerabilities to keep your containerized environments safe. The post How is a Container Scan Done? appeared first on Mend ...

Secrets Management vs Secrets Detection: Here’s What You Need to Know

|
Learn about secrets detection and management – very important but often overlooked parts of application security. The post Secrets Management vs Secrets Detection: Here’s What You Need to Know appeared first on ...

CVSS 4.0 is Here: How to Make the Most of It

|
Learn about the Common Vulnerability Scoring Systems 4.0 update as well as new metrics. The post CVSS 4.0 is Here: How to Make the Most of It appeared first on Mend ...